iOS (anti)forensics...
 
Notifications
Clear all

iOS (anti)forensics tool

4 Posts
3 Users
0 Reactions
976 Views
(@ztsib)
New Member
Joined: 14 years ago
Posts: 4
Topic starter  

Hello everyone,

I am currently looking for a topic for my MSc(infoSec) project and I am thinking of mobile forensics.It has to be something challenging research-oriented or practical(i know programming). There are a lot of tools available for forensic investigation on mobile devices, but for anti-forensics tools , the only one that I found recently was one developed for Android.(http//www.dfrws.org/2010/proceedings/2010-310.pdf)

Would it be a good idea(and feasible) to design a similar tool for iOS?
Any other relevant ideas are welcome

By the way , I know forensicfocus.com has a list of potential project , not interested in any of them.


   
Quote
 Doug
(@doug)
Estimable Member
Joined: 16 years ago
Posts: 185
 

I don't think there will be too much support for anti-forensics tools on here.

The only iOS tool I know in this sort of arena (more security than anti-forensics though) is JZ's
http//www.zdziarski.com/blog/?page_id=407


   
ReplyQuote
(@ztsib)
New Member
Joined: 14 years ago
Posts: 4
Topic starter  

I don't think there will be too much support for anti-forensics tools on here.

The only iOS tool I know in this sort of arena (more security than anti-forensics though) is JZ's
http//www.zdziarski.com/blog/?page_id=407

Thank you for the reply.I am aware of zdiarksi methods and realised that an anti-forensic tool in this forum might be a bit ironic.

I am also thinking of detecting wether anti forensics methods have been used on a mobile device.Any estimations if that would be feasible and contributing?


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

I am also thinking of detecting wether anti forensics methods have been used on a mobile device.Any estimations if that would be feasible and contributing?

Excellent idea. Under the normal examination process agents are required in some cases to be uploaded to particular makes/models in order that the reading device can gain access to handset content etc. That leaves a trace. Indeed previous australian research showed where a physical connection to a handset had been made a nibble of data was included in the data of the output file, which it might be suggested identifies for the handset the transport path for the return of the retrieved data.

For an anti-forensics tool it maybe the intention of it is to prevent access to content or do something, but, in the alternative the intention of an anti-forensics tool might not be designed to mask or delete its footprint of it having been present.


   
ReplyQuote
Share: